CSO

CSO Daily

September 04, 2019

Image: Insecure virtual USB feature in Supermicro BMCs exposes servers to attack

Insecure virtual USB feature in Supermicro BMCs exposes servers to attack

Security researchers have found a way to attach virtual USB devices remotely to Supermicro servers, including over the internet, by abusing a feature in their baseband management controller software. Read more ▶

Your Must-Read Stories

•

How to disable legacy authentication in Microsoft Exchange to enable MFA

•

Best Android antivirus? The top 11 tools

•

5 signs your security culture is toxic (and 5 ways to fix it)

•

How secure are your AI and machine learning projects?

•

What is the cost of a data breach?

•

ICS as a cloud service is coming: Will the benefits outweigh the risks?

eBook: OpenTech Systems, Inc

Intelligent Automation —Putting Content into Context

Information is cascading down upon every organization in unprecedented volumes and forms, challenging traditional and manual concepts of records management and information stewardship. This information tsunami is happening at the very time that the process value of these digital assets is more mission-critical than ever. Read more ▶

Image: How to disable legacy authentication in Microsoft Exchange to enable MFA

How to disable legacy authentication in Microsoft Exchange to enable MFA

Microsoft recommends enabling multi-factor authentication for Office 365. To do so, you must also disable basic or legacy authentication on Microsoft Exchange Server. Read more ▶

Image: Anyone Can Invest in Real Estate with DiversyFund

DEALPOST

Anyone Can Invest in Real Estate with DiversyFund

Investing in Real Estate Isn’t Just for the 1 Percent Read more ▶

Image: Best Android antivirus? The top 11 tools

Best Android antivirus? The top 11 tools

There are plenty of antivirus tools for Android. Here's how the top 11 measure up in protection, usability and features. Read more ▶

 
 
Image: 5 signs your security culture is toxic (and 5 ways to fix it)

5 signs your security culture is toxic (and 5 ways to fix it)

Here's how to get the security culture you want if you see these warning signs in your organization. Read more ▶

Image: How secure are your AI and machine learning projects?

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how several companies have minimized their risk. Read more ▶

Image: What is the cost of a data breach?

What is the cost of a data breach?

Data breach costs can be ongoing for years, a new study finds. Here's the breakdown of costs and advice on how to minimize them. Read more ▶

Image: ICS as a cloud service is coming: Will the benefits outweigh the risks?

ICS as a cloud service is coming: Will the benefits outweigh the risks?

Plugging industrial control and operational technology equipment into cloud-based monitoring and remote management systems increases visibility, but it also takes away their security by obscurity. Read more ▶

White Paper: Dropbox

The Value of Dropbox Business in Supporting Employee Collaboration

The modern enterprise is a distributed organization, with contractors, customers, employees, and vendors all working together to move the company forward. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.